What should you do while copying data on a suspect's computer that is still live??

A. ?Open files to view contents.
B. ?Make notes regarding everything you do.
C. ?Conduct a Google search of unknown extensions using the computer.
D. ?Check Facebook for additional suspects.


Answer: B

Computer Science & Information Technology

You might also like to view...

Which one of the following statements is true?

Consider the following two sets of code. (a) If (a = 1) And (b = 1) Then (b) If a = 1 Then txtBox.Text = "Hi" If b = 1 Then End If txtBox.Text = "Hi" End If End If ``` ``` (A) (a) and (b) will produce different outputs. (B) (b) is not a valid set of Visual Basic instructions. End If End If (A) (a) and (b) will produce different outputs. (B) (b) is not a valid set of Visual Basic instructions. (C) The two sets of code are equivalent, but (a) is preferred to (b) because (a) is clearer. (D) The condition statement in (a) is not valid.

Computer Science & Information Technology

The overhead associated with iterative methods is greater in terms of both memory space and computer time compared to the overhead associated with executing recursive methods.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To digitally record sound, ____________________ of a sound wave are collected at periodic intervals and stored as numeric data in an audio file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

ATM transfer rates are as fast as 311 Mbps.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology